CVE-2019-1905
Published Jun 20, 2019
Last updated 5 years ago
Overview
- Description
- A vulnerability in the GZIP decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper validation of GZIP-formatted files. An attacker could exploit this vulnerability by sending a malicious file inside a crafted GZIP-compressed file. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:email_security_appliance:11.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D4546FF-9B66-4280-AEB4-05A8A7927E23" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:12.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D79DBCFD-1AA0-4D28-8535-B398B6A42324" } ], "operator": "OR" } ] } ]